6.8
CVSSv2

CVE-2020-8625

Published: 17/02/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of ISC BIND. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of TKEY queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the "bind" user.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc bind 9.11.7

isc bind 9.11.3

isc bind 9.11.6

isc bind 9.11.5

isc bind 9.11.8

isc bind 9.11.21

isc bind 9.17.0

isc bind 9.17.1

isc bind 9.16.8

isc bind 9.16.11

isc bind 9.11.27

isc bind

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

siemens sinec infrastructure network services

netapp cloud backup -

netapp a250 firmware -

netapp 500f firmware -

Vendor Advisories

Debian Bug report logs - #983004 bind9: CVE-2020-8625 Package: src:bind9; Maintainer for src:bind9 is Debian DNS Team <team+dns@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 18 Feb 2021 05:33:01 UTC Severity: grave Tags: fixed-upstream, security, upstream Found in versions bin ...
A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code For the stable distribution (buster), this problem has been fixed in version 1:911 ...
A buffer overflow flaw was found in the SPNEGO implementation used by BIND This flaw allows a remote attacker to cause the named process to crash or possibly perform remote code execution The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (CVE-2020-8625) ...
A buffer overflow flaw was found in the SPNEGO implementation used by BIND This flaw allows a remote attacker to cause the named process to crash or possibly perform remote code execution The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (CVE-2020-8625) ...
A security issue was found in BIND 950 up to 91127, 9120 up to 91611, and versions BIND 9113-S1 up to 91127-S1 and 9168-S1 up to 91611-S1 of BIND Supported Preview Edition, as well as the release versions 9170 and 9171 of the BIND 917 development branch A vulnerability in BIND's GSSAPI security policy can be targeted by a buff ...

ICS Advisories

Siemens SINEC INS
Critical Infrastructure Sectors: Energy

Mailing Lists

To the packagers and redistributors of BIND -- To our great embarrassment and sincere regret, another serious problem has been found affecting servers upgrading to BIND 91612 If you have not already distributed packages based on 91612 but planned to do so, we recommend that you change your plans and instead issue an updated package based on ...
On February 17, 2021, Internet Systems Consortium has disclosed a vulnerability in our BIND 9 software about which we previously provided advance notice CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack kbiscorg/docs/cve-2020-8625 With the public announcemen ...
To the packagers and redistributors of BIND -- Regrettably, a problem has been discovered in two of the three public release versions of BIND we issued yesterday (17 February) A change to the serve-stale feature in BIND 91612 and BIND 91710 can cause the server to exit unexpectedly when that feature is in use Below is a message we shared w ...